咨询与建议

限定检索结果

文献类型

  • 10,253 篇 会议
  • 6,031 篇 期刊文献
  • 140 册 图书

馆藏范围

  • 16,424 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,673 篇 工学
    • 8,341 篇 计算机科学与技术...
    • 6,834 篇 软件工程
    • 2,207 篇 信息与通信工程
    • 1,368 篇 控制科学与工程
    • 1,127 篇 生物工程
    • 877 篇 电气工程
    • 736 篇 机械工程
    • 659 篇 电子科学与技术(可...
    • 606 篇 光学工程
    • 606 篇 生物医学工程(可授...
    • 391 篇 化学工程与技术
    • 358 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 322 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 304 篇 网络空间安全
    • 276 篇 建筑学
  • 4,828 篇 理学
    • 2,816 篇 数学
    • 1,236 篇 生物学
    • 956 篇 物理学
    • 816 篇 统计学(可授理学、...
    • 521 篇 系统科学
    • 412 篇 化学
  • 3,067 篇 管理学
    • 1,857 篇 管理科学与工程(可...
    • 1,332 篇 图书情报与档案管...
    • 750 篇 工商管理
  • 522 篇 医学
    • 450 篇 临床医学
    • 390 篇 基础医学(可授医学...
  • 443 篇 法学
    • 330 篇 社会学
  • 276 篇 经济学
    • 275 篇 应用经济学
  • 236 篇 教育学
  • 154 篇 农学
  • 43 篇 军事学
  • 42 篇 艺术学
  • 39 篇 文学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 624 篇 computer science
  • 481 篇 software enginee...
  • 337 篇 semantics
  • 318 篇 computational mo...
  • 315 篇 feature extracti...
  • 306 篇 deep learning
  • 272 篇 training
  • 224 篇 data mining
  • 218 篇 optimization
  • 214 篇 educational inst...
  • 174 篇 predictive model...
  • 172 篇 neural networks
  • 170 篇 application soft...
  • 167 篇 image segmentati...
  • 157 篇 computer archite...
  • 156 篇 machine learning
  • 155 篇 internet of thin...
  • 142 篇 authentication
  • 137 篇 servers
  • 136 篇 convolution

机构

  • 428 篇 college of compu...
  • 359 篇 school of comput...
  • 267 篇 school of inform...
  • 264 篇 school of comput...
  • 221 篇 school of comput...
  • 217 篇 school of comput...
  • 187 篇 state key labora...
  • 152 篇 school of softwa...
  • 139 篇 school of electr...
  • 134 篇 school of comput...
  • 124 篇 national enginee...
  • 109 篇 school of comput...
  • 106 篇 school of softwa...
  • 102 篇 school of softwa...
  • 102 篇 state key labora...
  • 99 篇 college of compu...
  • 98 篇 college of compu...
  • 96 篇 school of comput...
  • 96 篇 school of softwa...
  • 90 篇 school of softwa...

作者

  • 69 篇 tao dacheng
  • 52 篇 chen zhong
  • 51 篇 liu yang
  • 51 篇 zheng zibin
  • 39 篇 wang ping
  • 37 篇 hu ruimin
  • 35 篇 huang di
  • 34 篇 limin xiao
  • 34 篇 wang yasha
  • 34 篇 gao yang
  • 32 篇 wang lei
  • 32 篇 mian ajmal
  • 31 篇 bo du
  • 31 篇 miao huaikou
  • 31 篇 ruimin hu
  • 31 篇 qi lianyong
  • 30 篇 jun zhang
  • 28 篇 niyato dusit
  • 28 篇 wang wei
  • 27 篇 cui lizhen

语言

  • 15,189 篇 英文
  • 978 篇 其他
  • 274 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science& Software Engineering"
16424 条 记 录,以下是551-560 订阅
排序:
Predicting the Unseen: A Novel Dataset for Hidden Intention Localization in Pre-abnormal Analysis  24
Predicting the Unseen: A Novel Dataset for Hidden Intention ...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Qi, Zehao Zhang, Ruixu Hu, Xinyi Liu, Wenxuan Wang, Zheng National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Wuhan University Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan China School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan China
Our paper introduces a novel video dataset specifically for Temporal Intention Localization (TIL), aimed at identifying hidden abnormal intention in densely populated and complex environments. Traditional Temporal Act... 详细信息
来源: 评论
A High-capacity Information Hiding Scheme Based on Blakley Secret Sharing  4
A High-capacity Information Hiding Scheme Based on Blakley S...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, AIIM 2024
作者: Zhou, Jincheng Li, Yue Shen, Yujie Tang, Dan Cai, Hongliang Gong, Jing Bai, Ningchao School of Software Engineering Chengdu University of Information Technology Chengdu China Sichuan Province Engineering Technology Research Center of Support Software of lnformatization Application Chengdu China School of Computer Science and Engineering Sichuan University of Science & Engineering Yibin China Sichuan Provincial Big Data Technical Service Center Chengdu China
A high-capacity reversible information hiding scheme based on Blakley secret sharing is proposed to address the issues of low embedding rate and weak disaster recovery performance of images when using reversible infor... 详细信息
来源: 评论
A Transformer-based method for non-contact heart rate estimation from facial videos recorded in realistic environment  3
A Transformer-based method for non-contact heart rate estima...
收藏 引用
3rd Vision-Based Remote Physiological Signal Sensing Challenge and Workshop, RePSS 2024
作者: Hu, Yi Liu, Xuenan Rao, Xinlong Li, Bojing School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei230601 China School of Software Hefei University of Technology Anhui Hefei230601 China
The Video Photoplethysmography (VPPG) technique, while increasingly popular due to its convenience and cost-effectiveness, faces challenges in handling continuous head movements and vigorous motion interferences encou... 详细信息
来源: 评论
Quantum search algorithm for continuous domains
收藏 引用
science China(Physics,Mechanics & Astronomy) 2025年 第6期68卷 211-211页
作者: Lvzhou Li Institute of Quantum Computing and Software School of Computer Science and EngineeringSun Yat-sen UniversityGuangzhou 510006China
The paper“Fixed-point quantum continuous search algorithm with optimal query complexity”[1]presents another interesting application of quantum search algorithms by addressing one of the long-standing challenges in q... 详细信息
来源: 评论
Deep Residual Fourier and Self-Attention for Arbitrary Scale MRI Super-Resolution
Deep Residual Fourier and Self-Attention for Arbitrary Scale...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Wang, Xiaojie Xia, Jing Gao, Shanshan Hao, Xingwei Zhou, Yuanfeng School of Software Shandong University Jinan China Nanyang Technological University School of Computer Science and Engineering Singapore Singapore Shandong University of Finance and Economics School of Computer Science and Technology Jinan China
The excellent inherent contrast between biological tissues afforded by MR imaging is one of the foremost characteristics of this technique, but it depends on the scan time and hardware devices. Recent studies have sho... 详细信息
来源: 评论
UAV Enabled Sustainable IoT Network with OTPDRL  26
UAV Enabled Sustainable IoT Network with OTPDRL
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wang, Tiantian Liu, Lei Sun, Hongbo Hu, Jia Shandong University School of Software Jinan China YanTai University School of Computer and Control Engineering YanTai China Exeter University Computer Science United Kingdom
Integrating large-scale sensors into the network has become a research hotspot for its promising flexibility in monitoring vitally critical wild areas. However, the existing Internet of Things (IoT) systems are limite... 详细信息
来源: 评论
FedTop:a constraint-loosed federated learning aggregation method against poisoning attack
收藏 引用
Frontiers of computer science 2024年 第5期18卷 233-235页
作者: Che WANG Zhenhao WU Jianbo GAO Jiashuo ZHANG Junjie XIA Feng GAO Zhi GUAN Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China China Unicom Beijing 100033China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China
Federated learning(FL)is a decentralized machine learning paradigm,which has significant advantages in protecting data privacy[1].However,FL is vulnerable to poisoning attacks that malicious participants perform attac... 详细信息
来源: 评论
Adversarial Domain Adaptation for Non-Intrusive LOAD Monitoring  20
Adversarial Domain Adaptation for Non-Intrusive LOAD Monitor...
收藏 引用
20th International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2023
作者: Bongyi, Gao Bei, Hui School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China
Non-Intrusive Load Monitoring (NILM), known as energy disaggregation, is a method for determining the usage of separated devices by analyzing the overall energy consumption of an entire household. Understanding indivi... 详细信息
来源: 评论
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论
A Comparison of Deep Learning and Machine Learning Methods for Water Quality Prediction  3
A Comparison of Deep Learning and Machine Learning Methods f...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Srinivasa Gupta, N. Valarmathi, B. Hiwanj, Ishaan Department of Manufacturing Engineering School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India
Predicting water quality is essential to preserving human health and environmental sustainability. Traditional water quality assessment methods often face scalability and real-time monitoring limitations. With accurac... 详细信息
来源: 评论